OUR SERVICES
Need help with your technology, want to reduce costs, or protect your data?
Areas of Expertise
Microsoft 365 Solutions
Digital Transformation
As the demand for flexible remote working solutions increase, there is an opportunity to streamline business operations, technologies, communication, and automate processes.
Learn how Jadex Strategic Group’s Microsoft 365 Solutions can transform your business.

What is it? A comprehensive architecture/design that maximizes the features and capabilities available through Microsoft 365 subscriptions.
Why do you need it? Microsoft 365 comes with an entire suite of business tools and services. A majority of organizations begin using Microsoft 365 without developing a strategy to make the most out of their investment. Jadex designs solutions that maximize the features and capabilities available to our clients.
What do you get?
- Roadmap of Microsoft 365 related projects
- SharePoint Online Intranet
- Department landing pages and Team sites
- Microsoft Teams Virtual Meetings and Instant Messaging
- Content Management capabilities & features
- File permissions consulting
- List and custom list view creation
- Teams & SharePoint Online interoperability features
- Advance Teams Telephony capabilities
How long does this take? Jadex offers Architecture & Design solutions that range from 2 – 8 months.
What is it? A combination of consulting and technical implementations within SharePoint Online and OneDrive. This solution focuses on improving the use, capabilities, and features available within Microsoft SharePoint Online and OneDrive for Business.
Why do you need it? Often, organizations put minimal thought into how they are going to manage the content they create. To compound the problem, most are unaware of the content management features available within their current Microsoft 365 subscription. This results in individuals, teams, and departments developing their own methods for securing, storing, and the naming content. Our approach will allow your organization to create logical content management structures and improve accessibility while increasing security and compliance capabilities.
What do you get?
- File permissions consulting
- Organizational document libraries (for departments & teams)
- Document version history management
- Lists and Views creation
- Lists and Libraries metadata column creation
- Organizational and Department document template management
- Digital form creation
- Lists/Libraries Conditional Formatting
- Advance Teams Telephony capabilities
How long does this take? Jadex offers Content Management solutions that range from 2 months – 1 year.
What is it? Our engineers meet with business stakeholders to review and gain insights into the organizations documented and undocumented business processes. Then, we distribute a series of questionnaires, hold interviews, and facilitate process improvement working groups to refine the process. Finally, we leverage our findings to create and implement processes that can be automated through Microsoft 365 workflow templates.
Why do you need it? If you are seeking to fundamentally improve how your organization handles requests and automation of repetitive tasks, then your organization needs it. Our process automation solutions focus on automating processes that integrate with SharePoint, Teams, OneDrive, and additional Microsoft applications.
What do you get?
- Organizational process analysis and review
- Process automation roadmap
- Process automation designs
- Process automation implementations
- Establish a Process Improvement Champion program
How long does this take? Jadex offers Architecture & Design solutions that range from 2 months – 1 year.
What is it? Our analysts meet with the process stakeholders to review and gain insights into the foundation of the existing process. We then document and evaluate process triggers for opportunities to leverage Microsoft 365’s automation capabilities.
We go onto create a process automation design based on our analysis and documentation. During this phase of the project, our engineers regularly meet with process stakeholders to modify the process, in order to meet their specific requirements.
Why do you need it? You are seeking improve how your organization handles a specific process by leveraging Microsoft 365. Our process automation solutions focus on automating processes that integrate with SharePoint, Teams, OneDrive, and additional Microsoft applications.
What do you get?
- Individual process analysis and review
- Process automation design
- Process automation implementation
How long does this take? Jadex offers Architecture & Design solutions that range from 4 months.
What is it? Our analysts meet with the process stakeholders to review and gain insights into the foundation of the existing process. Then, we document and evaluate process triggers for opportunities to leverage Microsoft 365’s automation capabilities.
Next, we create a process automation design based on our analysis and documentation. During this phase of the project, our engineers regularly meet with process stakeholders to modify the process to meet their specific requirements.
Why do you need it? If you are seeking improve how your organization handles a specific process by leveraging Microsoft 365, then you need it. Our process automation solutions focus on automating processes that integrate with SharePoint, Teams, OneDrive, and additional Microsoft applications.
What do you get?
- Organizational Process and Business Systems Use Review
- Organizational No-Code Mobile Applications Roadmap
- Organizational No-Code Mobile Application Designs
- Organizational No-Code Mobile Application implementations and deployments
- Creation of a No-code Mobile Application Champions Program
How long does this take? Jadex offers Organizational No-code Mobile Application solutions that range from 2 months – 1 year.
What is it? Our analysts meet with business stakeholders to review and gain insights into a previously identified opportunity for no-code mobile application development.
Then, the collected information is used to refine the no-code application data types for standardization and usability considerations. Once the data types have been agreed upon, Jadex implements and deploys the application via Microsoft PowerApps.
Why do you need it? If you are seeking to digitize and modernize a specific processes or business application to increase accessibility, reduce costs, and improve operational efficiencies, then you need it.
What do you get?
- Individual Process or Business Application Review
- Individual No-Code Mobile Application design
- Individual No-Code Mobile Application implementation and deployment
How long does this take? Jadex offers Architecture & Design solutions that range from 4 months.
What is it? Jadex Strategic Group is a Microsoft Partner and has the ability provide Microsoft cloud subscriptions licenses directly to our clients.
Why do you need it? You would like a more personal experience when purchasing Microsoft software licenses. Unlike most cloud subscription providers, Microsoft is our only focus and our staff can make specific license recommendations for your business needs.
What do you get?
- Microsoft 365 subscriptions
- Microsoft Dynamics 365 Subscriptions
- Azure Subscriptions
How long does this take? Jadex offers Architecture & Design solutions that range from 4 months

Compliance Solutions
Our clients face a wide range of compliance requirements from various regulatory bodies. Jadex engineers assist our clients in configuring Microsoft 365 systems to meet required compliance improvement actions.
What is it? Microsoft Government Community Cloud High (GCC High) is a sovereign environment or ‘enclave’ that is essentially a copy of the Department of Defenses’ (DoD) government cloud and supported by Azure government. JADEX offers licensing set-up and configuration of this system per Microsoft’s Compliance Manager to manage the technical requirements of the National Institute of Technology and Standards (NIST 800-171) and the Cybersecurity Maturity Model Certification Maturity.
Benefits:
- U.S. data residency
- Supported by background-checked U.S. personnel
- Closest to FedRAMP authorized
- Handles International Traffic in Arms Regulations (ITAR) and Export Administration Regulations (EAR) marked data
- Forensics Information Reporting
- Meets DFARS 7012 para’s c-g flow down requirements for protecting CUI/Controlled Technical Information (CTI)
- CUI data types:
- CTI and Covered Defense Information (CDI)
- EAR data/research
- DoD Critical Infrastructure Information
- Unclassified Controlled Nuclear Information (UNCI)
- Can protect specified CUI with dissemination controls of:
- NOFORN
- RELTOUSA
- Suitable to handle DISA IL 4 or greater (rated at DISA IL 5 and is FedRAMP High equivalent)
Why do you need it? A GCC High enclave is for organizations that the need to protect CUI data types, specific dissemination controls, and is has data residency and management in the U.S. and by U.S. personnel.
This package is for organizations:
- Seeking to protected CUI data types and dissemination
- Ability to configure for CMMC or higher
- Management of ITAR/EAR or NOFORN data
- Compliance Manager for NIST 800-171/CMMC for auditors
- Managed within the S. and by background checked U.S. personnel.
- FEDRAMP High approved and in process
What do you get? With your GCC High Enclave you get the following:
- Compliance Manager Dashboard (place to upload policies, procedures, and manage controls for auditors)
- Configuration of the technical controls for NIST 800-171 and CMMC.
- Ability to protect CUI and other sensitive data types within a S. managed tenant.
How long does this take? It takes approximately 6 – 12 months
What is it? Microsoft’s GCC is a cloud environment that complies with federal, criminal justice, and federal tax information systems requirements. The package includes licensing and systems configuration of Microsoft’s Compliance Manager of technical controls for NIST 800-171 and can also be configured to CMMC.
Why do you need it? A GCC enclave is for organizations seeking protection of their CUI data types and needing to meet government compliance. GCC offers:
- U.S. data residency
- Manages federal, criminal justice, and federal tax information systems requirements – FBI CJIS (Criminal Justice Information Services)
- DoD SRG Level 2
- Unspecified CUI without dissemination controls
What do you get?
- Compliance Manager Dashboard (place to upload policies, procedures, and manage controls for auditors)
- Configuration of the technical controls for NIST 800-171 and CMMC.
- Ability to protect CUI and other sensitive data types within a U.S. managed tenant.
How long does this take? It takes approximately 6 – 12 months.
What is it? A compliance management solution inside the Microsoft 365 compliance center with enhanced compliance management capabilities and greater ease of use while having access to a large collection of pre-built assessments to help scale your compliance activities.
Why do you need it? Compliance manager helps you manage your organization’s compliance requirements with ease and convenience. Compliance Manager can help you throughout your compliance journey, from taking inventory of your data protection risks to managing the complexities of implementing controls, staying current with regulations and certifications, and reporting to auditors.
What do you get? Compliance Manager helps simplify compliance and reduce risk by providing:
- Pre-built assessments for common industry and regional standards and regulations, or custom assessments to meet unique compliance needs.
- Workflow capabilities to help efficiently complete risk assessments through a single tool.
- Detailed step-by-step guidance on suggested improvement actions to help comply with the standards and regulations that are most relevant for your organization. For actions that are managed by Microsoft, your business will see implementation details and audit results.
- A risk-based compliance score to help you understand your compliance posture by measuring your progress in completing improvement actions.
How long does this take? It takes approximately 6 – 12 months.
What is it? Jadex’s Compliance solutions are a series of compliance improvement actions available through Microsoft 365. These improvement actions focus on the following compliance related areas:
- Data Loss Prevention (DLP)
- Communications Compliance
- Information Governance
- Information Protection
- Insider Risk Management
- Data Handling
Why do you need it? To manage your organization’s pending or existing regulatory requirements by using Microsoft 365 for your business operations. Additionally, you would need our compliance solutions if you were hoping to secure your data and create rules around how, when, and where individuals gain access to it. Specifically, understanding how, when, and where to apply features like sensitivity labels or retention labels, and protect against insider risk.
What do you get?
- DLP policies
- Teams communication compliance policies
- Retention Label policies
- Records Management implementation
- Mailbox archiving enabled
- Sensitivity Labeling policies
- Sensitivity Labeling Auto-labeling policies
- Insider Risk Management policies
- Data Handling/Labeling exercises
How long does this take? It takes approximately 4 months.
Security Solutions
Learn how you can secure your Microsoft environment and minimize the need for costly third-party security solutions.

Microsoft 365 Systems Hardening
What is it? We make sure everything in your Microsoft 365 Admin Center is configured properly for baseline security hardening. Our team configures security hardening for settings configuration, security & privacy, and enables audit logging. This sets up Microsoft tenant’s password expiration policy, privacy profile, privileged access, self-service password reset, and Customer lockbox.
Additionally, it includes set-up of multi-factor authentication, modern authentication setup, Bookings and Calendar settings.
Why do you need it? Setting up controls within Microsoft 365 provides a baseline layer of security within your Microsoft 365 environment. Multiple security configurations address external sharing and security enhancements while aiding organizational security and privacy controls.
What do you get?
- This gives you a first layer of protection with a foundation of security for Microsoft 365.
How long does this take? It takes approximately 1 month.
What is it? We configure your tenant with the ability to encrypt email, apply email disclaimers, block email auto-forwarding within your company, and configure mobile device policies according to your organizations specific security controls and standards.
Examples of Email Hardening:
- Configuring requirements for alphanumeric passwords
- Minimum password length
- Mobile device to lock after a specified amount of idle time
Why do you need it? This is an additional layer of security that protects Microsoft Exchange and will provide your organization with the ability to send sensitive information through encrypted email.
What do you get?
- Email Encryption capabilities for transmitting secure data
- Custom Mail Flow configurations
- Mobile Device policies aligned with best security practices
How long does this take? It takes approximately 1 month.
What is it? This is an expert review of your organization’s SharePoint Online environment and permissions. Our engineers understand the frequent pitfalls associated with SharePoint permissions management and apply that knowledge to their evaluation. In addition, we configure SharePoint and OneDrive admin centers to align with best security practices.
Why do you need it? If you are or planning to leverage SharePoint Online or OneDrive for your organizations content management solutions, then this solution is necessary. By securing these areas and defining organizational parameters, you will have the ability to ensure the protection of the content you create.
What do you get?
- Organizational review of OneDrive & SharePoint Online permissions
- Configuration of Idle session sign-out policies
- Configuration of internal/external link sharing policies
- Adjust external sharing settings thresholds to encourage SharePoint use for external and OneDrive for internal uses
- Enable Modern Authentication requirements to access SharePoint and OneDrive
How long does this take? It takes approximately 1 month.
What is it? This service allows organizations to apply policies and permissions within Microsoft Teams for advanced security and privacy. It includes setting controls for content sharing internally and externally (participants and guest capabilities), and messaging policy features that are available to users when sending messages within the organization.
Why do you need it? If your organization is looking to set up policies and permissions in Microsoft Teams to provide access control of audio, video, content sharing, participants, and guests. This allows the organization to control what features, apps, and options are available to the organization within Teams.
What do you get?
- Policies for meetings & messages
- Team Apps permissions policies
How long does this take? It takes approximately 1 – 2 months.
What is it? Azure Active Directory is the backbone of Microsoft Office 365, and is used to manage businesses, and secure identities. Our Azure Active Directory Systems Hardening is an essential series of security enhancements that reinforce best security practices related to all aspects of Azure Active Directory. From custom sign-in pages and sign-in risk remediation polices to organizational-wide self-service password reset, and multifactor authentication, Azure Active Directory Systems Hardening encompasses a full suite of security enhancements.
Why do you need it? If your organization requires a tool to enforce user policies and rules as well as delegate control access to applications, then this is necessary for your organization. This will also provide your organization with an additional layer of identity security.
What do you get?
- Configure Company Branding for security purposes
- Restrict Users from consenting to Enterprise apps on behalf of the company
- Establish sufficient password authenticators
- Establish Detection User Risk/ Sign-in risk remediation policies
- Self-service Password Reset
- Multi-Factor Authentication
- Identity Governance | Access Reviews
How long does this take? It takes approximately 1 – 2 months.
What is it? This is our premier Microsoft 365 Security protection package. We apply security policies and features for advanced protection in the digital workspace to include:
- Anti-phishing Protect users from suspicious messages and phishing attacks.
- Safe Attachments Protect email and files storage locations like OneDrive, SharePoint, and Teams from malicious attacks delivered through files and email attachments.
- Safe Links Protect users by rerouting all links through a secure environment that is scanned for malicious threats before taking the user to the links’ destination.
- Anti-spam Provide email protection against spam for an organization along with how to handle identified threats.
- Anti-malware Provide email protection against malware for an organization along with how to handle identified threats.
- DKIM/DMARC Protect users at the hosting providers DNS before it reaches Microsoft 365. This provides an added layer of enhanced protection for all users.
Why do you need it? This protects your organization’s content, intellectual property (IP), and sensitive data. Applying advanced threat protection provides an additional layer of protection against external threats.
What do you get?
- Configuration of Anti-phishing policies
- Enable Safe Attachments
- Enable Safe Links
- Configuration of Anti-spam policies
- Configuration of Anti-malware policies
- DKIM/DMARC setup
How long does this take? It takes approximately 2 months.
What is it? When leveraging proper licensing, Microsoft Defender encompasses numerous security and monitoring areas within Microsoft 365 environments. Spanning from Microsoft Defender for Cloud to Microsoft Defender for Endpoints and all the Microsoft Defenders in between, JADEX has your organization covered.
Why do you need it? This allows your organization to utilize the full benefits Microsoft Defender protection while achieving the right balance of supporting access and protecting data. It will also provide rich visibility and control over data travel as well as sophisticated analytics that identify and combat cyberthreats across your Microsoft and third-party cloud services.
What do you get?
- Security Dashboards
- Microsoft Defender for Endpoints
- Microsoft Defender for Identity
- Microsoft Defender for Cloud
- Microsoft Defender for Office 365
- Microsoft Defender for
- Security Operations
- Threat Analytics
- Device inventory Security Overview
- Incidents
- Alert queues
- Reporting Capabilities
- Threat and Vulnerability Management Dashboard
- Visibility
- Data security
- Threat protection
- Compliance
How long does this take? This takes approximately 1 month.
Assessments
- Discovery
- Process Improvement
- Gap Analysis
- Operational Risk Assessment
- Risk Management Assessment
- Third-Party Risk Assessment
Training
- 1:1 Training
- Train-the-Trainer Approach
- Group Training
- E-Learning
- Security Training/Table Top Exercises
- Operational Preparedness
Company Details
- DUNS Number: 078570307
- CAGE Code: 6TX26
- NAICS Codes: 541690, 541990, 541611, 54618, 611420, 541370, 541519
Contact
- HQS - Spring Lake, MI
- Phone: 1 (833) 568-3925
- Email: info@jadexstrategic.com
Codes & Certs
- VOSB - self-certified
- SBA 8(a) - pending
Services
- Microsoft 365 Solutions
- Assessments
- Security
- Training